Topics
- All
- Security (124)
- Wi-Fi (44)
- Networking (41)
- Web Development (22)
- Malware (17)
- Broadband (16)
- Software (16)
- Smartphones (15)
- Browser (13)
- Collaboration (12)
- Mobility (11)
- Data Centers (10)
- Social Enterprise (9)
- It Employment (8)
- After Hours (6)
- Government (6)
- Cisco (5)
- Iphone (5)
- Printers (5)
- Servers (5)
- Android (4)
- Banking (4)
- Hardware (4)
- Privacy (4)
- Windows (4)
- Google Apps (3)
- Leadership (3)
- Project Management (3)
- Storage (3)
- Apps (2)
- Data Management (2)
- Fiber (2)
- Outsourcing (2)
- Patents (2)
- Software Development (2)
- Enterprise Software (1)
- Ios (1)
- It Policies (1)
- Laptops (1)
- Legal (1)
- Linux (1)
- Mobile Os (1)
- Pcs (1)
- Processors (1)
- Telcos (1)
- Travel Tech (1)
Content Types
About 445 results
-
Breach Detection Systems take aim at targeted persistent attacks
You've just been told to get a Breach Detection System in place. Where do you start? How about a buyer's guide created by an independent test facility?
-
New strain of ransomware evades detection by AV apps
Learn about a new type of ransomware that has the potential to snare many victims - and it's not even malware.
-
RiskRater: An IT-security test that no one fails
Three minutes. That's it. Take the RiskRater challenge. You could save yourself, your fellow employees, and family members from a costly Internet oops.
-
Why security metrics aren't helping prevent data loss
Security metrics are supposedly a way for upper management and IT departments to converse intelligently about in-house security programs. Why aren't the metrics working?
-
Android's very real 'Master Key' vulnerability
Android Master Key cryptography ensures applications are not tampered with. Michael P. Kassner interviews researchers who say the crypto process is severely flawed.
-
Why 'Nothing to Hide' misrepresents online privacy
A legal research professor explains to Michael P. Kassner why we should think long and hard before subscribing to the "Nothing to Hide" defense of surveillance and data-gathering.
-
Does using encryption make you a bigger target for the NSA?
Fact: The U. S. government is capturing data from its citizens. Fact: Encrypted data is of more interest to the U.S. government. Michael P. Kassner asks two experts, one legal, one...
-
Cheat sheet: What you need to know about 802.11ac
The newest wireless networking protocol is 802.11ac, due to be ratified sometime in 2013. Michael Kassner does the research and tells you what you need to know.
-
Convenience or security: You can't have both when it comes to Wi-Fi
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them even more.
-
Ignoring security advice from the pros: The IT-user disconnect
IT pros and the general population of users have seemingly different agendas when it comes to security. Michael P. Kassner interviews a noted researcher about the psychology of the...
-
BGP and Internet security: Is it better to be lucky or good?
Does "it's not a problem until it actually happens" apply to Internet security? Michael P. Kassner interviews a networking expert who's wondering about the same thing.
-
The anatomy of a phishing operation
There are far better things than being phished, like writing about how not to get phished. Michael P. Kassner reviews a research paper that provides amazing insight into a successf...
-
Virtualizing apps could be the bridge over the BYOD security gap
Allowing BYOD has unfavorable implications for both the company and employees. Michael P. Kassner explores what businesses are doing to mitigate the risk.
-
Aaron Swartz legacy lives on with New Yorker's Strongbox: How it works
Strongbox was Aaron Swartz's final project. Michael P. Kassner explains why The New Yorker requested a way to keep sources and their information secret.
-
Cloud-service contracts and data protection: Unintended consequences
There are things your cloud-service (Facebook, Amazon, Google, Dropbox, etc.) contracts aren't telling you. Michael P. Kassner interviews an attorney concerned about what's not bei...
-
Hackers: From innocent curiosity to illegal activity
Researchers asked why talented youth skilled in "computerese" evolve into criminal hackers. Michael P. Kassner explains their unexpected results.
-
BoxCryptor vs. DropSmack: The battle to secure Dropbox
Can DropSmack malware be stopped? Michael P. Kassner asks the creators of BoxCryptor if it is up to the task of securing the Dropbox file-synchronization service.
-
Understanding what motivates Chinese hackers
Michael P. Kassner, with the help of a noted academic and author, looks at what motivates Chinese hackers. It may not be what you think.
-
DropSmack: Using Dropbox to steal files and deliver malware
Michael P. Kassner interviews a digital forensic scientist who uses Dropbox to compromise targeted networks -- something the bad guys probably figured out as well.
-
Software-Defined Networking: How it affects network security
SDN technology is set to rewrite the book of networking. Michael P. Kassner looks into how SDN will improve security, and where it's vulnerable.